Abby Terlecki of Social Monsters discusses a 007-type secure satellite-based mobile hotspot can make the difference between a great day and disaster.
Browsing: Identity and Access Management (IAM)
Andrew Mabbitt of MWR InfoSecurity comments on the news that Chinese spies have reportedly stolen the designs for Australia’s new warplane.
Amrit Williams of CloudPassage discusses what lessons the U.S. CENTCOM Twitter hack should teach organizations.
Checkmarx explains how the Game of Hacks bridges the gap between app developers’ coding abilities and their security literacy.
32 percent of respondents who share an Internet-enabled device do not take any precautions to protect their data, says Kaspersky Lab.
Websense Security Labs discusses how Nuclear Pack, one of the most popular exploit kits, has evolved.
Riverlite has created an infographic that provides 5 questions SMEs should ask their providers about data security.
Silicon Labs, a leading IoT company, discusses how part of its BYOD initiative involved deploying HEAT Service Management in the cloud.
Matt Zanderigo of ObserveIT discusses how people, activity, and applications assembled together into a “security threat trifecta” for organizations.
Alan Hartwell of Oracle explains how a reluctance to embrace BYOD means businesses are missing out on considerable benefits.